21 February 19, 09:13
Analysis of a Fresh Variant of the Emotet Malware
Breaking Threat Analysis research paper by FortiGuard Labs By Xiaopeng Zhang February 18, 2019
Quote:Emotet is not a new malware family. In fact, it’s been around for several years. We captured a JS file spreading Emotet in 2017, which I then analyzed it and published two research papers on it, Part I and Part II.
Recently, FortiGuard Labs captured a fresh variant of Emotet. This time, it’s embedded in a Microsoft Word document. I did a quick analysis on it, and in this blog I’ll show you how it works on a victim’s machine.
The original file name of this infected document is PAY09735746167553.doc, and it contains malicious VBA code (Visual Basic for Applications) in a Macro. Figure 1 shows its content when it’s opened in Microsoft Word. The malicious VBA code is executed automatically using its “autoopen” function once a victim clicks the button “Enable Content”, as shown in Figure 1. After a period of time it generates a ton of PowerShell code and then executes it. This generated PowerShell code downloads the actual Emotet file from several URLs that are dynamically generated, as shown in Figure 2.
Emotet is Relocated to %LocalAppData%
The downloaded file is the Emotet malware. The name it uses is random string, and it is located in the %temp% folder. When it runs, it compares the file path of current process, and if it is not the same as %LocalAppData%\culturesource\culturesource.exe, it moves the original exe file from the %temp% folder to the above folder (it even creates the folder if it doesn’t already exist) and renames it as culturesource.exe. The word “culturesource” is a constant string decrypted from its memory.
More info on Source HERE
Fortinet Security Blog here


![[Image: image.img.png]](https://www.fortinet.com/blog/threat-research/analysis-of-a-fresh-variant-of-the-emotet-malware/_jcr_content/root/responsivegrid/image.img.png)
![[Image: image_1363261390.img.png]](https://www.fortinet.com/blog/threat-research/analysis-of-a-fresh-variant-of-the-emotet-malware/_jcr_content/root/responsivegrid/image_1363261390.img.png)
![[-]](https://www.geeks.fyi/images/collapse.png)


